Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | sqlite: Use our locking mechanism also when sqlite3_threadsafe() returns 0 | Martin Willi | 2015-04-13 | 1 | -7/+20 | |
| | | | | | | We previously checked for older library versions without locking support at all. But newer libraries can be built in single-threading mode as well, where we have to care about the locking. | |||||
* | sqlite: Show SQLite library version and thread safety flag during startup | Martin Willi | 2015-04-13 | 1 | -1/+8 | |
| | ||||||
* | vici: Defer read/write error reporting after connection entry has been released | Martin Willi | 2015-04-13 | 1 | -12/+34 | |
| | | | | | | | | | | | | | | | | If a vici client registered for (control-)log events, but a vici read/write operation fails, this may result in a deadlock. The attempt to write to the bus results in a vici log message, which in turn tries to acquire the lock for the entry currently held. While a recursive lock could help as well for a single thread, there is still a risk of inter-thread races if there is more than one thread listening for events and/or having read/write errors. We instead log to a local buffer, and write to the bus not before the connection entry has been released. Additionally, we mark the connection entry as unusable to avoid writing to the failed socket again, potentially triggering an error loop. | |||||
* | aead: Create AEAD using traditional transforms with an explicit IV generator | Martin Willi | 2015-04-13 | 5 | -12/+34 | |
| | | | | | | Real AEADs directly provide a suitable IV generator, but traditional crypters do not. For some (stream) ciphers, we should use sequential IVs, for which we pass an appropriate generator to the AEAD wrapper. | |||||
* | iv-gen: Add a generic constructor to create an IV gen from an algorithm | Martin Willi | 2015-04-13 | 4 | -2/+71 | |
| | ||||||
* | openssl: Don't pre-initialize OpenSSL HMAC with an empty key | Martin Willi | 2015-04-13 | 1 | -6/+16 | |
| | | | | | | | | | | With OpenSSL commit 929b0d70c19f60227f89fac63f22a21f21950823 setting an empty key fails if no previous key has been set on that HMAC. In 9138f49e we explicitly added the check we remove now, as HMAC_Update() might crash if HMAC_Init_ex() has not been called yet. To avoid that, we set and check a flag locally to let any get_mac() call fail if set_key() has not yet been called. | |||||
* | thread: Remove unneeded thread startup synchronization | Martin Willi | 2015-04-13 | 1 | -13/+4 | |
| | | | | | | | | | | | sem_init() is deprecated on OS X, and it actually fails with ENOSYS. Using our wrapped semaphore object is not an option, as it relies on the thread cleanup that we can't rely on at this stage. It is unclear why startup synchronization is required, as we can allocate the thread ID just before creating the pthread. There is a chance that we allocate a thread ID for a thread that fails to create, but the risk and consequences are negligible. | |||||
* | libsimaka: Link against Winsock2 on Windows | Martin Willi | 2015-04-13 | 1 | -0/+4 | |
| | | | | The library makes use of htons/ntohs(). | |||||
* | fips-prf: Remove superfluous <arpa/inet.h> include | Martin Willi | 2015-04-13 | 1 | -2/+0 | |
| | | | | | As we make no use of htonl() and friends, this is unneeded, but actually prevents a Windows build. | |||||
* | kernel-netlink: Fix GCC error about uninitialized variable use | Martin Willi | 2015-04-08 | 1 | -1/+1 | |
| | | | | | get_replay_state() always returns a replay_state_len when returning a replay state, but GCC doesn't know about that. | |||||
* | asn1: Undefine TIME_UTC, which is used by C11 | Martin Willi | 2015-04-08 | 1 | -0/+4 | |
| | | | | | When building with C11 support, TIME_UTC is used for timespec_get() and defined in <time.h>. Undefine TIME_UTC for our own internal use in asn1.c. | |||||
* | Wipe auxiliary key store5.3.0 | Andreas Steffen | 2015-03-28 | 1 | -1/+1 | |
| | ||||||
* | crypto-tester: Explicitly exclude FIPS-PRF from append mode tests | Martin Willi | 2015-03-28 | 1 | -8/+11 | |
| | | | | | This was implicitly done by the seed length check before 58dda5d6, but we now require an explicit check to avoid that unsupported use. | |||||
* | fips-prf: Fail when trying to use append mode on FIPS-PRF | Martin Willi | 2015-03-28 | 1 | -1/+6 | |
| | | | | | Append mode hardly makes sense for the special stateful FIPS-PRF, which is different to other PRFs. | |||||
* | Added PB-TNC test options to strongswan.conf man page | Andreas Steffen | 2015-03-27 | 1 | -0/+6 | |
| | ||||||
* | Added tnc/tnccs-20-fail-init and tnc/tnccs-20-fail-resp scenarios | Andreas Steffen | 2015-03-27 | 38 | -8/+582 | |
| | ||||||
* | Version bump to 5.3.0 | Andreas Steffen | 2015-03-27 | 1 | -1/+1 | |
| | ||||||
* | Fixed PB-TNC error handling | Andreas Steffen | 2015-03-27 | 4 | -35/+32 | |
| | ||||||
* | Added configurations for 3.18 and 3.19 KMV guest kernels | Andreas Steffen | 2015-03-27 | 2 | -0/+4346 | |
| | ||||||
* | Fixed strongswan.conf man page entry of imc-attestation | Andreas Steffen | 2015-03-27 | 2 | -18/+18 | |
| | ||||||
* | Added tnc/tnccs-20-pt-tls scenario | Andreas Steffen | 2015-03-27 | 24 | -5/+114 | |
| | ||||||
* | cmac: Reset state before doing set_key() | Martin Willi | 2015-03-27 | 1 | -0/+3 | |
| | ||||||
* | af-alg: Reset hmac/xcbc state before doing set_key() | Martin Willi | 2015-03-27 | 2 | -0/+2 | |
| | ||||||
* | xcbc: Reset XCBC state in set_key() | Martin Willi | 2015-03-27 | 1 | -0/+4 | |
| | | | | | If some partial data has been appended, a truncated key gets invalid if it is calculated from the pending state. | |||||
* | hmac: Reset the underlying hasher before doing set_key() with longer keys | Martin Willi | 2015-03-27 | 1 | -1/+2 | |
| | | | | | | | The user might have done a non-complete append, having some state in the hasher. Fixes #909. | |||||
* | crypto-tester: Test set_key() after a doing a partial append on prf/signers | Martin Willi | 2015-03-27 | 1 | -2/+20 | |
| | | | | | While that use is uncommon in real-world use, nonetheless should HMAC set a correct key and reset any underlying hasher. | |||||
* | stroke: Properly parse bliss key strength in public key constraint | Tobias Brunner | 2015-03-25 | 1 | -1/+1 | |
| | ||||||
* | eap-tnc: Free eap-tnc object if IKE_SA not found to get IPs | Tobias Brunner | 2015-03-25 | 1 | -0/+1 | |
| | ||||||
* | tnccs-20: Fix error handling in build() | Tobias Brunner | 2015-03-25 | 1 | -9/+5 | |
| | ||||||
* | android: Add messages/ita directory to tnccs-20 plugin | Tobias Brunner | 2015-03-25 | 1 | -1/+1 | |
| | ||||||
* | android: Sync libstrongswan Makefile.am and Android.mk | Tobias Brunner | 2015-03-25 | 1 | -0/+1 | |
| | ||||||
* | libtnccs: Set apidoc category to libtnccs and move plugins | Tobias Brunner | 2015-03-25 | 10 | -11/+14 | |
| | ||||||
* | libtnccs: Fix apidoc category for split IF-TNCCS 2.0 header files | Tobias Brunner | 2015-03-25 | 3 | -5/+5 | |
| | | | | | Fixes 80322d2cee75 ("Split IF-TNCCS 2.0 protocol processing into separate TNC client and server handlers"). | |||||
* | Fixed some typos, courtesy of codespell | Tobias Brunner | 2015-03-25 | 3 | -3/+3 | |
| | ||||||
* | kernel-netlink: Copy current usage stats to new SA in update_sa() | Tobias Brunner | 2015-03-25 | 1 | -6/+34 | |
| | | | | | | | | | | | | This is needed to fix usage stats sent via RADIUS Accounting if clients use MOBIKE or e.g. the kernel notifies us about a changed NAT mapping. The upper layers won't expect the stats to get reset if only the IPs have changed (and some kernel interface might actually allow such updates without reset). It also fixes traffic based lifetimes in such situations. Fixes #799. | |||||
* | child-sa: Add a new state to track rekeyed IKEv1 CHILD_SAs | Tobias Brunner | 2015-03-25 | 7 | -5/+15 | |
| | | | | | | This is needed to handle DELETEs properly, which was previously done via CHILD_REKEYING, which we don't use anymore since 5c6a62ceb6 as it prevents reauthentication. | |||||
* | ikev1: Inverse check when applying received KE value during Quick Mode5.3.0rc1 | Martin Willi | 2015-03-24 | 1 | -1/+1 | |
| | | | | Fixes Quick Mode negotiation when PFS is in use. | |||||
* | Version bump to 5.3.0rc1 | Andreas Steffen | 2015-03-23 | 1 | -1/+1 | |
| | ||||||
* | testing: added tnc/tnccs-20-mutual scenario | Andreas Steffen | 2015-03-23 | 11 | -0/+151 | |
| | ||||||
* | Implemented PB-TNC mutual half-duplex protocol | Andreas Steffen | 2015-03-23 | 6 | -35/+143 | |
| | ||||||
* | Optionally announce PB-TNC mutual protocol capability | Andreas Steffen | 2015-03-23 | 11 | -13/+428 | |
| | ||||||
* | Split IF-TNCCS 2.0 protocol processing into separate TNC client and server ↵ | Andreas Steffen | 2015-03-23 | 9 | -799/+1746 | |
| | | | | handlers | |||||
* | Merge branch 'dh-checks' | Martin Willi | 2015-03-23 | 34 | -253/+465 | |
|\ | | | | | | | | | Extend the diffie-hellman interface by success return values, and do some basic length checks for DH public values. | |||||
| * | encoding: Remove DH public value verification from KE payload | Martin Willi | 2015-03-23 | 1 | -73/+0 | |
| | | | | | | | | | | | | | | | | This commit reverts 84738b1a and 2ed5f569. As we have no DH group available in the KE payload for IKEv1, the verification can't work in that stage. Instead, we now verify DH groups in the DH backends, which works for any IKE version or any other purpose. | |||||
| * | diffie-hellman: Verify public DH values in backends | Martin Willi | 2015-03-23 | 7 | -1/+107 | |
| | | ||||||
| * | diffie-hellman: Add a bool return value to set_other_public_value() | Martin Willi | 2015-03-23 | 19 | -55/+123 | |
| | | ||||||
| * | diffie-hellman: Add a bool return value to get_my_public_value() | Martin Willi | 2015-03-23 | 23 | -39/+87 | |
| | | ||||||
| * | libimcv: Allow pts_t.set_peer_public_value() to fail | Martin Willi | 2015-03-23 | 4 | -7/+11 | |
| | | ||||||
| * | libimcv: Allow pts_t.get_my_public_value() to fail | Martin Willi | 2015-03-23 | 4 | -4/+14 | |
| | | ||||||
| * | encoding: Allow ke_payload_create_from_diffie_hellman() to fail | Martin Willi | 2015-03-23 | 5 | -13/+59 | |
| | |